Skip to content

xpool.eu

crypto news aggregator

AI Cryptocurrency Cybersecurity

AI Threat to Cryptocurrency Security: A Closer Look

Posted on: May 25, 2025

Artificial intelligence (AI) is transforming cryptocurrency systems, bringing efficiency and advanced security measures. However, this integration introduces new vulnerabilities that could expose platforms to new cyberattacks. As blockchain […]

Cybersecurity Financial Loss Phishing

Phishing Attack Causes Significant Financial Loss of $146,551

Posted on: May 24, 2025

A recent phishing attack has resulted in a significant financial loss of $146,551 through malicious bulk transactions. The victim’s address involved in the incident is 0xc6d289d55fe64227a09e3120855ccba0d2e606dc. The attackers […]

Cybersecurity Financial Loss Phishing

Phishing Attack Causes $146,551 Financial Loss

Posted on: May 24, 2025

A recent phishing attack has resulted in a significant financial loss of $146,551 due to fraudulent bulk transactions. The victim’s address involved in the incident is 0xc6d289d55fe64227a09e3120855ccba0d2e606dc. The […]

Cetus Cybersecurity Smart Contract

Cetus Hack: $230 Million Theft Driven by Overflow Vulnerability

Posted on: May 24, 2025

A new analysis by SlowMist provides a deeper look at the recent $230 million theft from Cetus, revealing how an overflow vulnerability was exploited to manipulate token values. […]

Cryptocurrency Cybersecurity Law Enforcement

DOJ Seizes $24M in Crypto from Qakbot Leader: Global Crackdown Continues

Posted on: May 23, 2025

The U.S. Department of Justice (DOJ) has seized a significant amount of cryptocurrency, approximately $24 million, linked to Rustam Rafailevich Gallyamov, the mastermind behind the notorious Qakbot malware […]

Cybersecurity JAMB Nigeria

DSS and Police Arrest 20 Suspects Over Hacking of JAMB’s CBT System

Posted on: May 23, 2025

The Department of State Services (DSS) and the Nigerian Police have apprehended 20 suspects in Abuja for allegedly hacking into JAMB’s computer-based test (CBT) system for the 2025 […]

Africa Cybersecurity Higher Education

Cybersecurity Threats Permeate African Higher Education

Posted on: May 23, 2025

The digital revolution has transformed education in Africa, bringing universities into the online age with a wave of new systems. This progress, however, brings a critical challenge: cybersecurity. […]

Cryptocurrency Cybersecurity Qakbot

DOJ Seizes Over $24 Million in Cryptocurrency Tied to Qakbot Malware

Posted on: May 23, 2025

The United States Department of Justice (DOJ) has filed a civil forfeiture complaint aiming to seize nearly $24 million in cryptocurrency linked to the notorious Qakbot malware. This […]

Coinbase Cryptocurrency Cybersecurity

Coinbase Hacker Launders Millions After Data Breach, Challenges Investigators Publicly

Posted on: May 23, 2025

A recent data breach at Coinbase has taken a dramatic turn after the hacker began laundering funds and publicly challenged investigators. On-chain activity reveals a significant movement of […]

Cryptocurrency Cybersecurity Malware

Cybercriminals Target macOS Users With Phishing Attacks Using Fake Ledger Live Apps

Posted on: May 23, 2025

Cybercriminals are exploiting the popularity of cryptocurrency wallets, specifically those using Ledger Live on macOS devices, by creating fake applications to steal users’ sensitive data. A cybersecurity firm, […]

Cryptocurrency Cybersecurity Malware

Crypto Theft via Fake Ledger Live App On Rise

Posted on: May 23, 2025

A growing cybersecurity threat targets macOS users, with hackers increasingly leveraging fake versions of the popular Ledger Live app to steal seed phrases and drain crypto wallets. A […]

Cybersecurity Malware Microsoft

Microsoft Dismantses Major Cybercriminal Operation Targeting Lumma Malware

Posted on: May 22, 2025

Tech giant Microsoft has taken decisive action against the “Lumma Stealer,” a powerful malware tool that has silently compromised hundreds of thousands of computers worldwide. In a recent […]

Cryptocurrency Cybersecurity Malware

DOJ & Microsoft Shut Down Key Cryptocurrency Malware Network

Posted on: May 22, 2025

A joint effort by the Department of Justice (DOJ), Microsoft, and other private sector partners has taken down LummaC2, a widely-used malware service responsible for stealing sensitive information […]

Cryptocurrency Cybersecurity Malware

US DOJ Dismantles LummaC2 Malware Network, Impacting Millions in Cryptocurrency Losses

Posted on: May 22, 2025

The US Department of Justice (DOJ) has taken a significant step in combating cybercrime, seizing the infrastructure of the LummaC2 malware network responsible for stealing sensitive financial information […]

Blockchain Cryptocurrency Cybersecurity

Hacker Targets Cryptocurrency Security, Sending Taunt Message and Laundering $300 Million

Posted on: May 22, 2025

A recent high-profile cyber attack has sent shockwaves through the cryptocurrency community. This audacious heist saw a hacker exploit THORChain, an interchain decentralized exchange platform, to illegally move […]

Posts pagination

Previous page Page 1 … Page 18 Page 19 Page 20 … Page 37 Next page

#BTC AI Altcoin Altcoins Binance Binance Coin Bitcoin Blockchain BlockDAG BNB Cardano Coinbase Crypto Cryptocurrency Crypto Market Crypto Presale Crypto Regulation DeFi Dogecoin ETF ETFs Ethereum Finance Fintech Institutional Investment Investment Market Analysis Market Trends Market Volatility Meme Coin Meme Coins MoonBull Presale Regulation Ripple SEC Shiba Inu Solana Stablecoin Stablecoins Technical Analysis Trading Trump Web3 XRP

Copyright © 2025 xpool.eu
Manage Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
  • Manage options
  • Manage services
  • Manage {vendor_count} vendors
  • Read more about these purposes
View preferences
  • {title}
  • {title}
  • {title}